[ELSA-2016-3635] Unbreakable Enterprise kernel security update
Severity
Important
Affected Packages
14
CVEs
1
kernel-uek
[4.1.12-61.1.17]
- sched: panic on corrupted stack end (Jann Horn) [Orabug: 24971921] {CVE-2016-1583}
- ecryptfs: forbid opening files without mmap handler (Jann Horn) [Orabug: 24971921] {CVE-2016-1583}
- proc: prevent stacking filesystems on top (Jann Horn) [Orabug: 24971921] {CVE-2016-1583}
- ID
- ELSA-2016-3635
- Severity
- important
- URL
- https://linux.oracle.com/errata/ELSA-2016-3635.html
- Published
-
2016-11-03T00:00:00
(7 years ago) - Modified
-
2016-11-03T00:00:00
(7 years ago) - Rights
- Copyright 2016 Oracle, Inc.
- Other Advisories
-
- DSA-3607-1
- ELSA-2016-2124
- ELSA-2016-2766
- ELSA-2016-3636
- ELSA-2016-3644
- ELSA-2016-3646
- ELSA-2019-4644
- FEDORA-2016-1c409313f4
- FEDORA-2016-63ee0999e4
- FEDORA-2016-73a733f4d9
- RHSA-2016:2766
- SUSE-SU-2016:1596-1
- SUSE-SU-2016:1672-1
- SUSE-SU-2016:1696-1
- SUSE-SU-2016:1937-1
- SUSE-SU-2016:1961-1
- SUSE-SU-2016:1985-1
- SUSE-SU-2016:1994-1
- SUSE-SU-2016:1995-1
- SUSE-SU-2016:2000-1
- SUSE-SU-2016:2002-1
- SUSE-SU-2016:2005-1
- SUSE-SU-2016:2006-1
- SUSE-SU-2016:2007-1
- SUSE-SU-2016:2009-1
- SUSE-SU-2016:2010-1
- SUSE-SU-2016:2014-1
- SUSE-SU-2016:2105-1
- SUSE-SU-2016:2245-1
- SUSE-SU-2017:0333-1
- USN-2996-1
- USN-2997-1
- USN-2998-1
- USN-2999-1
- USN-3000-1
- USN-3001-1
- USN-3002-1
- USN-3003-1
- USN-3004-1
- USN-3005-1
- USN-3006-1
- USN-3007-1
- USN-3008-1
Source | # ID | Name | URL |
---|---|---|---|
elsa | ELSA-2016-3635 | http://linux.oracle.com/errata/ELSA-2016-3635.html | |
CVE | CVE-2016-1583 | http://linux.oracle.com/cve/CVE-2016-1583.html |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-7 | oraclelinux | kernel-uek | < 4.1.12-61.1.17.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek?distro=oraclelinux-6 | oraclelinux | kernel-uek | < 4.1.12-61.1.17.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-7 | oraclelinux | kernel-uek-firmware | < 4.1.12-61.1.17.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-firmware?distro=oraclelinux-6 | oraclelinux | kernel-uek-firmware | < 4.1.12-61.1.17.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-7 | oraclelinux | kernel-uek-doc | < 4.1.12-61.1.17.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-doc?distro=oraclelinux-6 | oraclelinux | kernel-uek-doc | < 4.1.12-61.1.17.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-devel | < 4.1.12-61.1.17.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-devel | < 4.1.12-61.1.17.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug | < 4.1.12-61.1.17.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug | < 4.1.12-61.1.17.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-7 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-61.1.17.el7uek | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/kernel-uek-debug-devel?distro=oraclelinux-6 | oraclelinux | kernel-uek-debug-devel | < 4.1.12-61.1.17.el6uek | oraclelinux-6 | ||
Affected | pkg:rpm/oraclelinux/dtrace-modules-4.1.12-61.1.17.el7uek?distro=oraclelinux-7 | oraclelinux | dtrace-modules-4.1.12-61.1.17.el7uek | < 0.5.3-2.el7 | oraclelinux-7 | ||
Affected | pkg:rpm/oraclelinux/dtrace-modules-4.1.12-61.1.17.el6uek?distro=oraclelinux-6 | oraclelinux | dtrace-modules-4.1.12-61.1.17.el6uek | < 0.5.3-2.el6 | oraclelinux-6 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |